The task can be run only if you have an active Kaspersky Industrial CyberSecurity for Node license key with an ICS Audit licensed object.
For the following rule sources, you can configure and launch a Security Audit task using the command line interface:
To configure and launch a Security Audit task using the command line interface:
cd
command, navigate to the folder where the Agent.exe file is located.For example: cd "C:\Program Files (x86)\Kaspersky Lab\Endpoint Agent"
agent.exe --scan-oval [--source={kl|kl-compl|file}] [--repository=show] [--path={<
full path and name of archive with OVAL rules
>|<
full path to folder containing files with OVAL- and XCCDF rules
>}] [--external-vars=<
full path and name of ZIP archive with external variables
>] [--mode={all|exclude|include}] [--definitions=<
vulnerability_type_01
;
vulnerability_type_02
;
vulernability_type_N
>] [--log={none|critical|warning|information|debug}] --result-path=<
path to folder with report
>
Command parameters for configuring and launching a Security Audit task
Parameter |
Description |
|
Required parameter. Starts a Security Audit task on the device. |
|
Determines the source of rules required by the Security Audit. Available values:
If the parameter is omitted, the Kaspersky ICS CERT vulnerability database ( |
|
This parameter is available if the selected rule source is security configurations and standards compliance for operating systems ( If the parameter is specified, then instead of executing the Security Audit task, Kaspersky Endpoint Agent saves an XML file that lists the names of the existing security configurations to the folder specified by the |
|
This parameter passes the path to the files with rules for the Custom rule database from file source ( Possible parameter values:
OVAL and XCCDF rules must be saved in UTF-8 without BOM. |
|
This parameter specifies the full path and name of the ZIP archive with the XML file with external variables for OVAL rules. The parameter is available if the source contains only OVAL rules. |
|
This parameter defines the vulnerability scan mode. The parameter is available if the source contains only OVAL rules. Possible parameter values:
If the parameter value is not specified, the |
|
Semicolon-separated list of vulnerability types that must be scanned or must be excluded from being scanned. The parameter is available if the source contains only OVAL rules. For example: Used together with the |
|
This parameter determines the logging mode for recording task events. Available values:
The log file in LOG format is saved to the folder specified by the |
|
Required parameter. Specifies the path to the folder where the scan report in XML format is stored. The file name contains the node name, as well as the date and time when the task was run. A log file in LOG format with task events is saved in the same folder. If the parameter is not specified, the task's execution will fail. |
Return codes of the --scan-oval
command:
0
– command successfully executed;1
– general error.If the command completes successfully (code 0
), a report in XML format is saved in the folder specified by the --result-path
parameter. If the --log
parameter was specified, a log file in LOG format with task events is saved there as well.